Received: by 2002:ac0:946b:0:0:0:0:0 with SMTP id j40csp2665074imj; Mon, 11 Feb 2019 06:42:04 -0800 (PST) X-Google-Smtp-Source: AHgI3IYK76aIrxnkadLMH1jMgzwbGTlEz2ceZvIkixBXVrM1Ppt0yED0gQ3xWfJnDTfwkDPWdGFj X-Received: by 2002:aa7:8a17:: with SMTP id m23mr25182594pfa.258.1549896124216; Mon, 11 Feb 2019 06:42:04 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1549896124; cv=none; d=google.com; s=arc-20160816; b=wH8V+9J5dKHMtqZofNufs1VzbqCRrJy7T3BCoyyVdAOxTwIFZur8ITTskCs3OEUiot 0OEmlVJQdsvvkUj5nqHVvlitRIp/7lZjvqVXU6f0lhpdBVPQ7l701+pTszfUvsep4+2b 9DWTfdGtNxtA9DbFAd0oA5TMeY89jSBKgpTwaiP5GSjlWHSxy40pdZuwWeRaJPBGQCtU e9W90imL44yh7xj+xHLSO0un7oUyl/Ty2TBcpkNP23qesjQsw/b3zXu//Fo7FvLmzXIF 6o4ujan+wRxxIqz5GQ5cl3d9EoZJv+LVkQgGav/daig206kqBbPhMoFs0Ze0pEMcQw5j ahTQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=AoxLtlJnIgfhmwUza7zi7buEY7nZG+280RmSdyFH23Q=; b=ToxRWbZwy/cULJMK9Ky7oR3GZWGUxoTnfzQJMmQr5/meRIWQA+Fn9CX61loz0gMA6G 9ywA/8k5eDJxqotHWsH49NBF0gV8oM4DwSODd4Rkdi1HJsY4coFxKsdtUiz/yFPmOsMg ElxeThVe3dSxxK9kL2FeceKI/87taTRF5SvKS4ud1dM6rokbnpzSpNdi4frr6/hSiIwg msWbRHJ5eGUSS8sGq3VcBSzrY5CbpRLZKtI7b5C+PuavSWhCu4Rz/Bm/wn1kS7Paw3iO P5IZ/7JNLBIQe1ccgalrPVNo+ICSUQWIAkM+/XiBpgB9jx+qMO54kRMMiBcZ1+54EFTw GE6g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=EG517t4M; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y138si2100944pfb.72.2019.02.11.06.41.47; Mon, 11 Feb 2019 06:42:04 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=EG517t4M; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731773AbfBKOkv (ORCPT + 99 others); Mon, 11 Feb 2019 09:40:51 -0500 Received: from mail.kernel.org ([198.145.29.99]:51702 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732119AbfBKOkp (ORCPT ); Mon, 11 Feb 2019 09:40:45 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id BE0B82082F; Mon, 11 Feb 2019 14:40:43 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1549896044; bh=Iju7zvCK3IUyEXHXAavvQOMNcvWcKt3ISIkw3kWrNPg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=EG517t4MOAjJc18jw1dF/ZGke8hEMszttHf9LSvg+CpTugkKIx+Ab/DJFaj3ekddK cWmIRvVdYzxWW1cucj/Vl88Xv/iGeVIALfrrAY6mWclLqradSkAIA2gurHBeFqx3D4 nzjQ5yGQN2vFCTfbOxSWPzlfcOOldbgdUHbBclVE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Chao Yu , Gao Xiang , Sasha Levin Subject: [PATCH 4.19 053/313] staging: erofs: fix the definition of DBG_BUGON Date: Mon, 11 Feb 2019 15:15:33 +0100 Message-Id: <20190211141857.302650912@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190211141852.749630980@linuxfoundation.org> References: <20190211141852.749630980@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.19-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit eef168789866514e5d4316f030131c9fe65b643f ] It's better not to positively BUG_ON the kernel, however developers need a way to locate issues as soon as possible. DBG_BUGON is introduced and it could only crash when EROFS_FS_DEBUG (EROFS developping feature) is on. It is helpful for developers to find and solve bugs quickly by eng builds. Previously, DBG_BUGON is defined as ((void)0) if EROFS_FS_DEBUG is off, but some unused variable warnings as follows could occur: drivers/staging/erofs/unzip_vle.c: In function `init_alway:': drivers/staging/erofs/unzip_vle.c:61:33: warning: unused variable `work' [-Wunused-variable] struct z_erofs_vle_work *const work = ^~~~ Fix it to #define DBG_BUGON(x) ((void)(x)). Reviewed-by: Chao Yu Signed-off-by: Gao Xiang Signed-off-by: Greg Kroah-Hartman Signed-off-by: Sasha Levin --- drivers/staging/erofs/internal.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/staging/erofs/internal.h b/drivers/staging/erofs/internal.h index 367b39fe46e5..e6313c54e3ad 100644 --- a/drivers/staging/erofs/internal.h +++ b/drivers/staging/erofs/internal.h @@ -39,7 +39,7 @@ #define debugln(x, ...) ((void)0) #define dbg_might_sleep() ((void)0) -#define DBG_BUGON(...) ((void)0) +#define DBG_BUGON(x) ((void)(x)) #endif #ifdef CONFIG_EROFS_FAULT_INJECTION -- 2.19.1